Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    77s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 13:40

General

  • Target

    d065d64f7c4337ad41084822bb42a914c41d472c24b81672482a04c80d3d936d.exe

  • Size

    1.1MB

  • MD5

    c6b3ea254494813a29365c9e859bcee2

  • SHA1

    deacc9e229da78007053edf82efdfdb791e37caa

  • SHA256

    d065d64f7c4337ad41084822bb42a914c41d472c24b81672482a04c80d3d936d

  • SHA512

    8892321adf3c4f7d5a2d289f2acbc9a4aa4453fbce0a0dcb0bcf3fd6174f081763ae3be22fb86c664933d5ae413585249bb372be247bbe2fc45f52e0254763fb

  • SSDEEP

    24576:dy0ut8WVf1ML14NR0TBCiWYCNmJFSY3HcytEV9JIiluTqtkYKHIv/P5kh:40sPsiSVCiWYtJAY3HyTqilrkxon

Malware Config

Extracted

Family

redline

Botnet

rumfa

C2

193.233.20.24:4123

Attributes
  • auth_value

    749d02a6b4ef1fa2ad908e44ec2296dc

Extracted

Family

redline

Botnet

dunkan

C2

193.233.20.24:4123

Attributes
  • auth_value

    505c396c57c6287fc3fdc5f3aeab0819

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 17 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d065d64f7c4337ad41084822bb42a914c41d472c24b81672482a04c80d3d936d.exe
    "C:\Users\Admin\AppData\Local\Temp\d065d64f7c4337ad41084822bb42a914c41d472c24b81672482a04c80d3d936d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plMv18oE09.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plMv18oE09.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pldP79IE33.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pldP79IE33.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4764
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plLC85fG06.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plLC85fG06.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3696
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plAr55SY50.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plAr55SY50.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1568
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buzs46Zh30.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buzs46Zh30.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4324
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cakE56fo21.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cakE56fo21.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1540
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 1348
                7⤵
                • Program crash
                PID:3540
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diYR97bB38.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diYR97bB38.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3320
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 1080
              6⤵
              • Program crash
              PID:4184
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esLi93ff73.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esLi93ff73.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3164
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3164 -s 1348
            5⤵
            • Program crash
            PID:460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuwd7320qo84.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuwd7320qo84.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grED69Kv60.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grED69Kv60.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:396
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1540 -ip 1540
    1⤵
      PID:916
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3320 -ip 3320
      1⤵
        PID:1076
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3164 -ip 3164
        1⤵
          PID:3184

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grED69Kv60.exe

          Filesize

          176KB

          MD5

          09446da8c0e89797b44f868f1b7cd815

          SHA1

          166173bdb448db29de3980db0051c1fefce657c5

          SHA256

          a88183a91dfaf2b935557502de7360ca4c54c020e3e1ce5fd5f768d7bc97c52c

          SHA512

          25db35c9475460f897fc0a88840d0c9e7df0c90e3181909677fc0fdac5d0e7bffc3df5cfef761e5c96df71da3148dc3d5db317bb704f55416b0620a7f3471984

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\grED69Kv60.exe

          Filesize

          176KB

          MD5

          09446da8c0e89797b44f868f1b7cd815

          SHA1

          166173bdb448db29de3980db0051c1fefce657c5

          SHA256

          a88183a91dfaf2b935557502de7360ca4c54c020e3e1ce5fd5f768d7bc97c52c

          SHA512

          25db35c9475460f897fc0a88840d0c9e7df0c90e3181909677fc0fdac5d0e7bffc3df5cfef761e5c96df71da3148dc3d5db317bb704f55416b0620a7f3471984

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plMv18oE09.exe

          Filesize

          992KB

          MD5

          3d8ff7433159815b2ef053f0460800c6

          SHA1

          fa1b3090ef8aea8a0c474e2f5e62e81c648bf160

          SHA256

          10280378832943a21838695bcedec0e0c477de3c51587a86b387517f596b20cc

          SHA512

          335c6ffc064cc748e9a6694bc6b283b7a2385cf020b29677200d9d03fc26143bcc63d25e738c40df1c6fdeef764c5c87bf93fc01f57f01eb7cfc0bdaa321f6cb

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plMv18oE09.exe

          Filesize

          992KB

          MD5

          3d8ff7433159815b2ef053f0460800c6

          SHA1

          fa1b3090ef8aea8a0c474e2f5e62e81c648bf160

          SHA256

          10280378832943a21838695bcedec0e0c477de3c51587a86b387517f596b20cc

          SHA512

          335c6ffc064cc748e9a6694bc6b283b7a2385cf020b29677200d9d03fc26143bcc63d25e738c40df1c6fdeef764c5c87bf93fc01f57f01eb7cfc0bdaa321f6cb

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuwd7320qo84.exe

          Filesize

          17KB

          MD5

          0afe41df7290da1760132472c834ccd1

          SHA1

          5da826aa0af805f9db9c125708f37538262e16db

          SHA256

          0ad847f762c6263cedeb934595bcd5dad8503cf665b0400a5f335b20016a4965

          SHA512

          b35368525967a2c6aa93effbf9ab49fc035cac973a12f0822bd82db2e3d61f6f9692cd01d7bef9679d352053c6a648320f269482e920bc816389714d186a03e6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fuwd7320qo84.exe

          Filesize

          17KB

          MD5

          0afe41df7290da1760132472c834ccd1

          SHA1

          5da826aa0af805f9db9c125708f37538262e16db

          SHA256

          0ad847f762c6263cedeb934595bcd5dad8503cf665b0400a5f335b20016a4965

          SHA512

          b35368525967a2c6aa93effbf9ab49fc035cac973a12f0822bd82db2e3d61f6f9692cd01d7bef9679d352053c6a648320f269482e920bc816389714d186a03e6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pldP79IE33.exe

          Filesize

          892KB

          MD5

          994990c223b2768689e13b0c00d66d68

          SHA1

          81e90f98a6e6f4268556affd90253ad565fdd1a9

          SHA256

          e9e519db546a4c335105a7fa9b47554cc59fedac2d25de761fdb4a9d73ceb60f

          SHA512

          85ad5ba8df882d07954b7d7f8124470a2f49a64c926534ab9cac99803be0e63fd527c467550417829c905e56ca8875cdf4936aa370da63d083984987a06d6bd4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pldP79IE33.exe

          Filesize

          892KB

          MD5

          994990c223b2768689e13b0c00d66d68

          SHA1

          81e90f98a6e6f4268556affd90253ad565fdd1a9

          SHA256

          e9e519db546a4c335105a7fa9b47554cc59fedac2d25de761fdb4a9d73ceb60f

          SHA512

          85ad5ba8df882d07954b7d7f8124470a2f49a64c926534ab9cac99803be0e63fd527c467550417829c905e56ca8875cdf4936aa370da63d083984987a06d6bd4

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esLi93ff73.exe

          Filesize

          304KB

          MD5

          ad61b513e0bbc3784d0c28ba13ab19ff

          SHA1

          0d86785da45331516385d7d72e18457e32b89aed

          SHA256

          5e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037

          SHA512

          80d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\esLi93ff73.exe

          Filesize

          304KB

          MD5

          ad61b513e0bbc3784d0c28ba13ab19ff

          SHA1

          0d86785da45331516385d7d72e18457e32b89aed

          SHA256

          5e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037

          SHA512

          80d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plLC85fG06.exe

          Filesize

          666KB

          MD5

          87f1089ce6245a55c4a66ee9be2aabc5

          SHA1

          948ca462a19c26eea7f1cab8d72f81a69c02f2ca

          SHA256

          754f586536f2afff4d6df062437d70ddeb79d0d2f3804b12a5ec687fcaae73ce

          SHA512

          d8d882e93f1b4a236decfedbe5d6fd6f01b6e21042446c2cdea320614ae562a9542e43f4c5f04d293e816bcf09a877f4e619b9f89998fc0b18c076ea1e0b65f2

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plLC85fG06.exe

          Filesize

          666KB

          MD5

          87f1089ce6245a55c4a66ee9be2aabc5

          SHA1

          948ca462a19c26eea7f1cab8d72f81a69c02f2ca

          SHA256

          754f586536f2afff4d6df062437d70ddeb79d0d2f3804b12a5ec687fcaae73ce

          SHA512

          d8d882e93f1b4a236decfedbe5d6fd6f01b6e21042446c2cdea320614ae562a9542e43f4c5f04d293e816bcf09a877f4e619b9f89998fc0b18c076ea1e0b65f2

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diYR97bB38.exe

          Filesize

          246KB

          MD5

          97c977c85d447742b3e217de53a0f069

          SHA1

          053a758567d8c26f1aea1e74382133097d8ba74d

          SHA256

          ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d

          SHA512

          14fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\diYR97bB38.exe

          Filesize

          246KB

          MD5

          97c977c85d447742b3e217de53a0f069

          SHA1

          053a758567d8c26f1aea1e74382133097d8ba74d

          SHA256

          ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d

          SHA512

          14fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plAr55SY50.exe

          Filesize

          391KB

          MD5

          91c93bb355abf14a279132c9608fbf87

          SHA1

          8dad928676a2342d24bab27c132000d09f5ea780

          SHA256

          0003b8c6507fd6659f57245bfc2be382706edef386837f2310a071194a2af638

          SHA512

          ab6f9a0fa2c8c78069b3144d5600af054ba79c4beeacb2b954c1d5af1bd7a9a55d4422770635649ae0c4506b4401e9d54404b32fe952f1f4725e6335c2377f78

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\plAr55SY50.exe

          Filesize

          391KB

          MD5

          91c93bb355abf14a279132c9608fbf87

          SHA1

          8dad928676a2342d24bab27c132000d09f5ea780

          SHA256

          0003b8c6507fd6659f57245bfc2be382706edef386837f2310a071194a2af638

          SHA512

          ab6f9a0fa2c8c78069b3144d5600af054ba79c4beeacb2b954c1d5af1bd7a9a55d4422770635649ae0c4506b4401e9d54404b32fe952f1f4725e6335c2377f78

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buzs46Zh30.exe

          Filesize

          17KB

          MD5

          24970b1954d89694eca668f5bde6506e

          SHA1

          f3a2d37f43ce8068780ad9db084c293953c31b55

          SHA256

          b1472898439cd0b9e8abc508f1533a49e4e2e96a2857a8f3f3a3540d0dc17fae

          SHA512

          f7c14a4708e5c12a8ba2d03706c7102540a4034eb73d57f06398a82bafea66241488e46c0487a3e466e718eb1ae277a60022d78b3de2e2c33595f4f084e64c78

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buzs46Zh30.exe

          Filesize

          17KB

          MD5

          24970b1954d89694eca668f5bde6506e

          SHA1

          f3a2d37f43ce8068780ad9db084c293953c31b55

          SHA256

          b1472898439cd0b9e8abc508f1533a49e4e2e96a2857a8f3f3a3540d0dc17fae

          SHA512

          f7c14a4708e5c12a8ba2d03706c7102540a4034eb73d57f06398a82bafea66241488e46c0487a3e466e718eb1ae277a60022d78b3de2e2c33595f4f084e64c78

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buzs46Zh30.exe

          Filesize

          17KB

          MD5

          24970b1954d89694eca668f5bde6506e

          SHA1

          f3a2d37f43ce8068780ad9db084c293953c31b55

          SHA256

          b1472898439cd0b9e8abc508f1533a49e4e2e96a2857a8f3f3a3540d0dc17fae

          SHA512

          f7c14a4708e5c12a8ba2d03706c7102540a4034eb73d57f06398a82bafea66241488e46c0487a3e466e718eb1ae277a60022d78b3de2e2c33595f4f084e64c78

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cakE56fo21.exe

          Filesize

          304KB

          MD5

          ad61b513e0bbc3784d0c28ba13ab19ff

          SHA1

          0d86785da45331516385d7d72e18457e32b89aed

          SHA256

          5e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037

          SHA512

          80d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cakE56fo21.exe

          Filesize

          304KB

          MD5

          ad61b513e0bbc3784d0c28ba13ab19ff

          SHA1

          0d86785da45331516385d7d72e18457e32b89aed

          SHA256

          5e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037

          SHA512

          80d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\cakE56fo21.exe

          Filesize

          304KB

          MD5

          ad61b513e0bbc3784d0c28ba13ab19ff

          SHA1

          0d86785da45331516385d7d72e18457e32b89aed

          SHA256

          5e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037

          SHA512

          80d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a

        • memory/396-2071-0x0000000005100000-0x0000000005110000-memory.dmp

          Filesize

          64KB

        • memory/396-2070-0x0000000000810000-0x0000000000842000-memory.dmp

          Filesize

          200KB

        • memory/1540-220-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-1086-0x0000000005830000-0x000000000593A000-memory.dmp

          Filesize

          1.0MB

        • memory/1540-187-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-189-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-192-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

          Filesize

          64KB

        • memory/1540-190-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

          Filesize

          64KB

        • memory/1540-194-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-193-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

          Filesize

          64KB

        • memory/1540-196-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-198-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-200-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-202-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-204-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-206-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-208-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-210-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-212-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-214-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-216-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-218-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-183-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-222-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-224-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-226-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-228-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-230-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-232-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-234-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-236-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-238-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-240-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-242-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-1085-0x0000000005190000-0x00000000057A8000-memory.dmp

          Filesize

          6.1MB

        • memory/1540-185-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-1087-0x0000000005970000-0x0000000005982000-memory.dmp

          Filesize

          72KB

        • memory/1540-1088-0x0000000005990000-0x00000000059CC000-memory.dmp

          Filesize

          240KB

        • memory/1540-1089-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

          Filesize

          64KB

        • memory/1540-1092-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

          Filesize

          64KB

        • memory/1540-1091-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

          Filesize

          64KB

        • memory/1540-1093-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

          Filesize

          64KB

        • memory/1540-1094-0x0000000005C80000-0x0000000005D12000-memory.dmp

          Filesize

          584KB

        • memory/1540-1095-0x0000000005D20000-0x0000000005D86000-memory.dmp

          Filesize

          408KB

        • memory/1540-1096-0x0000000006690000-0x0000000006852000-memory.dmp

          Filesize

          1.8MB

        • memory/1540-1097-0x0000000006870000-0x0000000006D9C000-memory.dmp

          Filesize

          5.2MB

        • memory/1540-1098-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

          Filesize

          64KB

        • memory/1540-1099-0x00000000070B0000-0x0000000007126000-memory.dmp

          Filesize

          472KB

        • memory/1540-1100-0x0000000007150000-0x00000000071A0000-memory.dmp

          Filesize

          320KB

        • memory/1540-174-0x00000000009F0000-0x0000000000A3B000-memory.dmp

          Filesize

          300KB

        • memory/1540-175-0x0000000004BE0000-0x0000000005184000-memory.dmp

          Filesize

          5.6MB

        • memory/1540-176-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-177-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-179-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/1540-181-0x0000000004B40000-0x0000000004B7E000-memory.dmp

          Filesize

          248KB

        • memory/3164-2056-0x0000000002710000-0x0000000002720000-memory.dmp

          Filesize

          64KB

        • memory/3164-2058-0x0000000002710000-0x0000000002720000-memory.dmp

          Filesize

          64KB

        • memory/3164-2059-0x0000000002710000-0x0000000002720000-memory.dmp

          Filesize

          64KB

        • memory/3164-2060-0x0000000002710000-0x0000000002720000-memory.dmp

          Filesize

          64KB

        • memory/3164-1149-0x0000000002710000-0x0000000002720000-memory.dmp

          Filesize

          64KB

        • memory/3164-1148-0x0000000002710000-0x0000000002720000-memory.dmp

          Filesize

          64KB

        • memory/3320-1115-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/3320-1117-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/3320-1111-0x0000000000710000-0x000000000073D000-memory.dmp

          Filesize

          180KB

        • memory/3320-1113-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/3320-1141-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/3320-1142-0x0000000004D10000-0x0000000004D20000-memory.dmp

          Filesize

          64KB

        • memory/4324-168-0x0000000000D40000-0x0000000000D4A000-memory.dmp

          Filesize

          40KB